Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
557d804614ba7307017ee3315274e88b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
557d804614ba7307017ee3315274e88b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
557d804614ba7307017ee3315274e88b_JaffaCakes118.html
-
Size
57KB
-
MD5
557d804614ba7307017ee3315274e88b
-
SHA1
073070eea3f00fdda2de6facf049737ddbdfdf79
-
SHA256
760be3759b5b6633bf91bd9d9b4e115c0734364e67265284cab5b57d23485dca
-
SHA512
37f58d05cd954cf4a6accd882458e6d9c496414584cda18b0a654e631180d67a579f40f1057a57f4b260fcb1b7cc23aece58fecb64c2ec1117a629bcc4e8b99a
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrodiwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrodiwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 4424 msedge.exe 4424 msedge.exe 656 identity_helper.exe 656 identity_helper.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2400 4424 msedge.exe 84 PID 4424 wrote to memory of 2400 4424 msedge.exe 84 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 4972 4424 msedge.exe 85 PID 4424 wrote to memory of 2528 4424 msedge.exe 86 PID 4424 wrote to memory of 2528 4424 msedge.exe 86 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87 PID 4424 wrote to memory of 3480 4424 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\557d804614ba7307017ee3315274e88b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd64e246f8,0x7ffd64e24708,0x7ffd64e247182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,1492728056731154768,3867540405362930872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD585c0dfe443093e689e776112e0224c41
SHA11e82054859ac864aaf7545537c9d69c4e4b18c30
SHA256b940176512516da5b4bfbb0bedc47c6da06637b8e45f5e048e127091065d747c
SHA512e579356625fce4dd18b530cca0e49e8691acdd7699216f8d136dd180b8842d227491d91c02a53326efc42e7d6216471f7ced5d9b4491b61ba93915d7f675aa40
-
Filesize
2KB
MD5bf81ba5c99b53987ae9d9a9835549418
SHA1237fb058dba31b2d58d526883bfc026faf540c77
SHA256c584a4e95bb3bed398ca026da255c5369ef6745fd2ee61fc986751bdaef4b729
SHA512191d9d949c5d54ddab4d3250040fc9e2179a464053d1abc1984719864fb1ba0b426bcfce7abfc8a6100f8c037f61ab2bd086d5c298b49ff712a56b40fcc58fab
-
Filesize
6KB
MD5a35cc0cb289866b3fd461062cc53e0da
SHA1dd9356f09453a642ea4c5e551b501f2d677c48d5
SHA256b56ecf64c33295f2954240098645aace1bc6a1d07e16f2e2b6e5408fef501b1d
SHA512085fa0c44fa612e4d58a37c683d861772331d67e52cea49ed69fdcdaaddf9dce67134a7b68cc29235b502a96b84d28700a8014877fb1a5c4a9f5e8103289863c
-
Filesize
5KB
MD59f4568b3d8f0dbff336b21b05408ebf1
SHA1a5a0f1da033b8ab5f38a7397d47e69c1a152f1c3
SHA25632b792f7efb81a602757d41550ca9a453cba19aacf9b4583a4b7a8c20c29a482
SHA5127062fe8bde60d477fa6eb7bb97ecd9325c3e2e7d64eae3f63febf57d5935a36291be46de6ebf1171c27466c06c5818d00b232568fb31dbf2e132f325ac4c1e69
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55b0ec5824d35c0f3c6f3d52a26e82134
SHA1196d19ef5e078a9a3c22b75d57a6bf213bf58fa7
SHA25663d557938f344b9146477fd729a8691eeac110488dee14a0e4b079c59339b164
SHA51274228c96af10047bd42c9c723740b08fefd07f10b378a62bbe8ff8da090806d3074541aff53e821b2fe42dcef1ec49582b84a946263977c4008a2d01517ee211