Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
56f509cce707f5ec321b3ef2c8b80aed_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
56f509cce707f5ec321b3ef2c8b80aed_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56f509cce707f5ec321b3ef2c8b80aed_JaffaCakes118.html
-
Size
63KB
-
MD5
56f509cce707f5ec321b3ef2c8b80aed
-
SHA1
ec0593f31a7b2f4cf255f2cd0c1b62af3f76bff1
-
SHA256
ad2126e2824b5fe4f0a47736dcb79fb5a74d46e73ca9d9a3e12489d18882ecc4
-
SHA512
caeec9a007c12b0fa80ac4829b3e351829e8fa5b83d8fcfcfc157d6f245f77bd97a963a1895b2f885da9de2d0305ca3f2675ae301e436e5604b76f005428cb8d
-
SSDEEP
1536:1DIHDImEI9m20jgGH86/OdiUxUFYayrJq/oD9k6uEVCJCEky+G8kUvL4c9tXY:1DIHDI5E6/TUxUFYayrJqAi0r9tXY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 4868 msedge.exe 4868 msedge.exe 4896 identity_helper.exe 4896 identity_helper.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3632 4868 msedge.exe 85 PID 4868 wrote to memory of 3632 4868 msedge.exe 85 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 5112 4868 msedge.exe 86 PID 4868 wrote to memory of 3020 4868 msedge.exe 87 PID 4868 wrote to memory of 3020 4868 msedge.exe 87 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88 PID 4868 wrote to memory of 3712 4868 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\56f509cce707f5ec321b3ef2c8b80aed_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8e4a46f8,0x7ffd8e4a4708,0x7ffd8e4a47182⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3016 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3028 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16413072698807678285,5050686284151455253,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD593ee80043e0a5550791458341d3d795b
SHA17ef7fffbb2d6e744151999acca2d33e7724b1094
SHA256607d92cba24b6c27c2c1f82a31c6faf803109bddec2ce3acec9dba7f36e8a26b
SHA51262dd38f97d6370c606cea5fe6ee160c088c64fe0dd9f683a8fdeb42420ad01798ecd4142baae21324c20279661719f8c5bff3a095ae67978f1dd9da554d88682
-
Filesize
1KB
MD534465bec07264ded748db1a5826380fd
SHA13b9d34de7ae785148664fc5d2870c5258beafb37
SHA256813d5c2e766f5a14058eaafd821c2fbb8cebba3d330a34dbef273d0825542229
SHA512d117436488897e7567a8d1ca313b9fba7b23c081a73fe561c6ffb8c207a176e6aa8b6ccf70e981f86f5ad74fa8d6862911712295390b152f3499f4c66fc742db
-
Filesize
6KB
MD5e79b8685a306ee2c8159cbc4555405b0
SHA1b8ca817ea8632a56fe1d410c1cd4f10ac500c65a
SHA256bd29a3d620257f6052f3c4b5f5fc22e6d8723735b661a9cb0345fa81098c3387
SHA512d1b4e76b5553813cc13c9b8d2dcd719fbe4ef84be02ad78973581cbf49919fc61921c9b424232c2143b094f436fbf80c21388cf23f033bf1048ef1087dadc733
-
Filesize
5KB
MD589ee25bdad0cfa003bbb1390204b8716
SHA16f020c652a353ceaec101a2bda183249c30ea47c
SHA2566ee6a2d463da5c1739788db6666dc7f206e4c1a9a85cce1184cdab04bbccdc6e
SHA51235ff1b2afbe67c73c9eda17d116f55c9f6a2de8d19abfe7bcac9f05fd5ac9fd98a7d94a5a8618bbf1dad8cd767c47e677cddc26aaeb839ecd5fe0db82a2a0973
-
Filesize
6KB
MD573805525b0470f4c6f2fffc7a980854e
SHA14755f302843fda109762d3a35a5dbf0edb52887a
SHA2564ec48935e2d004cc79ef7dffcf470b8b01dcf0b68615e995db9b75219055f776
SHA5128a96bd36b55acf8cf5a4998cb620dd93ef753800f35e7e5b1482c9482e19ed2fce864d6eb9c3d9b2c8d321b114b1de95eae36d6633659696405b43d0a614b3cd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53af98ee9acb1dcb51e322f34ebf2c617
SHA18424bf15c157c32b12e5596b4d801e0241caf2ec
SHA2560097dd59ee00ea96037121de0f2feabac0185ec02b0d22454b86d02bae143ac3
SHA512df543c11bef07bda923c49c643413d29ab227518b21d890f7833a3a04be04257837246aed1026ccb6d2a5dde9a288dd0473707490d3d7991d16231a0327eff89