Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
558c33b6f134a6903f1f205af06edbb3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
558c33b6f134a6903f1f205af06edbb3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
558c33b6f134a6903f1f205af06edbb3_JaffaCakes118.html
-
Size
7KB
-
MD5
558c33b6f134a6903f1f205af06edbb3
-
SHA1
19edabacc202ba244be3f0521b78b2a2d9067e76
-
SHA256
47a82110f944108ce4ef02bf58c8a1b2420d6a114285c7b5ebd4df5e80629664
-
SHA512
9abe6c44455360e8530fb6625e25bce5903bb8b24463e618caf3db06a0d7ed46cb97659d4c70ec160e785e9ac0128cdfe45e972a3f6c6832fbcf08eddeae140e
-
SSDEEP
48:ImMq1UpZANAiEgVr+CflxYOZAyWWjY4xt5YWDrWN8lAXHXykIM+LuLMwtZ3x64oa:SIfNf9ZYwoTXHXbITaFtNx6qkYdRTkRC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 4412 msedge.exe 4412 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 1304 4412 msedge.exe 84 PID 4412 wrote to memory of 1304 4412 msedge.exe 84 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1164 4412 msedge.exe 85 PID 4412 wrote to memory of 1552 4412 msedge.exe 86 PID 4412 wrote to memory of 1552 4412 msedge.exe 86 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87 PID 4412 wrote to memory of 4092 4412 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\558c33b6f134a6903f1f205af06edbb3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8344446f8,0x7ff834444708,0x7ff8344447182⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5014911758505061092,17162035481737481874,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5216f30cea5b58a4f10b573f6f1c5e55b
SHA1974c64aebac71642b1bd405e8554348b2ce9837b
SHA2564d7b6df5cb6ae3c2871011c04b8b935d2010e61b154b22ff11726182158705d5
SHA51272b647754ed62663d30905e66843892f6448c95546124e54e1ac267c66306f3bfa579a55616cd82bc1669ba5c7800a043159a9edefd971012ba44c0642901d2a
-
Filesize
1KB
MD587085b0b925a1d763f7a8c44ff74709f
SHA1c0a8c81bbe7e20a61b60db49eb6ff6c05c9cd272
SHA2563936a5aa6f93340ecfef6fd0cde130cf1380499a6f5453f19260620722eead73
SHA51200dbcf850779f41a67c0720d696fffac43d2873b9b98620c7ccdd47ec7c1ded4d57ca61b0bb38f9373f622a209071dc81fe231343afe417bb2f5050b669042b1
-
Filesize
5KB
MD50d179fe826909cb903ae94e03795f031
SHA178b8d5d584dae69e6def074e25fc648c856c94da
SHA2567a22bb41df0aac4e91aa264ca4fed27c5f8a1e40136b743b2f72fbc07acd2a13
SHA512ec5377355c5a6a54565e4f1a61b819926d59ac576e61af1374fb7945278cd2ec77d5f9d922f11960f7e9dd308dde40ac2aa3a7faf853f7aec9de62c0976a008b
-
Filesize
6KB
MD5bdd2456a74f674e7a5e7b7290bd2cca4
SHA1e9232f44807afed9f3bab15d7360abc6752292df
SHA256196d93ff0332195abcbbe3ba991a9cd575a84f477545f50a94f4a9704ffec6ce
SHA51247e6b2bb40638ba2560f9a313056f4730419c967fe86dbda61d2941d94ce45effe8b9edecea4b89447ef644c2766edab4ed448165d9b8f96bfd0792f7f4da349
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD505eaa8dd5fed4f92c50645fe95cb76e7
SHA168bb47cbef170db4377175d58bdba1893d6c0839
SHA2567f6918356457af66e9032cb735ce717eca1feba713939e3a467dea011f46bf69
SHA512ba5c2048e5bf38c5e50846bf23ddfd83dcb61590136e1cfa847ce2169e895931b006b833eac39379d2403c689c4757d072c755b7165e734e68de872c66f3445d