Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
56df0ae2f7fb295815fed8131491d182_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56df0ae2f7fb295815fed8131491d182_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56df0ae2f7fb295815fed8131491d182_JaffaCakes118.html
-
Size
53KB
-
MD5
56df0ae2f7fb295815fed8131491d182
-
SHA1
6c0af378e4c199768f307ab0d226e7c78820e73f
-
SHA256
9b6b02b00602bb7612c7b8fe358d76546c9364b09acda3c962d7ce7da861440e
-
SHA512
9620d6b8ebb8beca509edf854b0c882bd09b70e7097674889ff0ed351e9d5f80e174d014a7e8c3e108cad949e1983a7751e64b5a31d10c89fea6845e50cb1828
-
SSDEEP
1536:gQZBCCOdt0IxCsRqIVe4yX4KFPKiw64P+6/R3Ivi2Sr5vh/3KTbZfJ6p2Nl97Xgt:gk2L0IxxVe4yX4KFPKiw64P+6/R3Ivi3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 4492 msedge.exe 4492 msedge.exe 1980 identity_helper.exe 1980 identity_helper.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 2288 4492 msedge.exe 84 PID 4492 wrote to memory of 2288 4492 msedge.exe 84 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 3528 4492 msedge.exe 85 PID 4492 wrote to memory of 1896 4492 msedge.exe 86 PID 4492 wrote to memory of 1896 4492 msedge.exe 86 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87 PID 4492 wrote to memory of 3120 4492 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\56df0ae2f7fb295815fed8131491d182_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf7a146f8,0x7ffbf7a14708,0x7ffbf7a147182⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11199678873622375240,8889977530555263903,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
215KB
MD50e3d96124ecfd1e2818dfd4d5f21352a
SHA1098b1aa4b26d3c77d24dc2ffd335d2f3a7aeb5d7
SHA256eef545efdb498b725fbabeedd5b80cec3c60357df9bc2943cfd7c8d5ae061dcc
SHA512c02d65d901e26d0ed28600fa739f1aa42184e00b4e9919f1e4e9623fe9d07a2e2c35b0215d4f101afc1e32fc101a200ca4244eb1d9ca846065d387144451331c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5fcbcef3acf3a170dfc12508f6f661eb4
SHA12c950508ce6d4f22013363680359765d8c500e7a
SHA2566193f44b217c1a31c896deff40c8827ec2c9bc58419a1afe275a10213528d73f
SHA512ab226d7c59ba49be4a6402a2f04e55e27e00443a1486cb1774767e3b8f3d4432e6a6a35efeb7a35990ff141725c5179107797aa83ac2eabdda236fca896ae965
-
Filesize
1KB
MD52b7c63b436a24fbc4916936d738b8ea6
SHA1b0cb119f3e9f3c38e98eaad5358e2602f012c871
SHA25672170ff7a8310a317400398e338523e95957fc0e09d584aec21ffce69950b07e
SHA512620d70bbc0d4a44fdc6eb41637c440216d5d71e495d971994065da97cfe122998d1f8df7edd865fbe13aaa24a2de5573eba37b39d365365bbcdf1ab19313858d
-
Filesize
5KB
MD5ac7f2079659a91b28e953dd9607979d2
SHA165a95ef11d98b21acce78af2f054fbc65ec12112
SHA256ebb7d68475d01463ba763a80e758a0452a789e6f1df1f97deafa6eddc76f11e8
SHA512b2b933338e8c2124dcf9fb4505549fb3a3fe4d02b612f3c3e82f4291f7f3b0ba7f311dcf2af1edabe6b04c89bdbeef40a4f736ff28af98a2e112aa18a9dc6230
-
Filesize
6KB
MD594975dea453452575593814d2bf3a34c
SHA11f7ebc3eab46094f617d0d015e3514b31abaa540
SHA2568efadad0a6f18c96f9f7b597982176e8ec81c78dc2c318fdc18dd41d223aa01c
SHA512bca5738e5ca49dbfc39296094f2c0f955faf2eb6fbc039cf76237cc40fed26989e347557d6de3389c6da3b1e3de77c4b1644206f1830fb932680b0faebe7a9ee
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5444d439c871ab3e2a872b3e800808be8
SHA10cc6ed8e2743c55993341d71f2ca2cc10d86b668
SHA2560ec593d675bf4fb2481395745d741779aebe0fe06be67ea7e1b642e3078beedb
SHA512eeba7f6df9b345eaf08e049ee018be715b4f6479eeea655bfd20fdd00d54a8b2a911165b5a5959ca9b2937959d7e5a075c4d34e581610186ce33f5e014d597ad