Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
575054b1083238a9d7ea5278bee35f59_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
575054b1083238a9d7ea5278bee35f59_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
575054b1083238a9d7ea5278bee35f59_JaffaCakes118.html
-
Size
69KB
-
MD5
575054b1083238a9d7ea5278bee35f59
-
SHA1
c900d34997c531f66258766d0f1eb51dd97ec058
-
SHA256
36e8ebdd797c70a778e13e1093ec5481b51d5651cd93e5ac54a664aacdeca3bb
-
SHA512
854f925e1a5868c357f9929197f7fcfcb754733728f2b82dc661d13e12d17f4b3dd1c87aca6dd98212f57c0150dbe05d75147486a72bb03bcf61ccc62f1ac06b
-
SSDEEP
1536:RFf068yQJY3Tps27weeeeeejeeeeeLeeeee8eeeeeC1eeeeee1sUR7eeeeeeeeeS:RFf068yQJY3Vs6ZX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 788 msedge.exe 788 msedge.exe 3844 identity_helper.exe 3844 identity_helper.exe 5920 msedge.exe 5920 msedge.exe 5920 msedge.exe 5920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 788 wrote to memory of 4004 788 msedge.exe 84 PID 788 wrote to memory of 4004 788 msedge.exe 84 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 4868 788 msedge.exe 85 PID 788 wrote to memory of 2320 788 msedge.exe 86 PID 788 wrote to memory of 2320 788 msedge.exe 86 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87 PID 788 wrote to memory of 388 788 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\575054b1083238a9d7ea5278bee35f59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9ed2946f8,0x7ff9ed294708,0x7ff9ed2947182⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6920 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7088 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9981660758674256861,4924775538527453997,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
33KB
MD5285520bc859a840449187cc43864a1cb
SHA13d85ac9801d3cc9a3577bc6f6ef3c754d2677dff
SHA256ac8e37a73437f2c13789726ea053c21fcdfd485896aabd6498702064968e34da
SHA5127d99e9b95ed4fdc8a510b3830e7948be99d55edfac91ec71c4c7e534176a25ebe48c1955dc39a950f1a3322ef7d18910048c16492ebb9ff54d517a294602d6a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD515a4a00b65fdc2bbc20849ec59925bd5
SHA10f17ec529deb2106d6e2390b6adbbe6c3b01824a
SHA2567f7a77d7e65fb8a3f4c39224c5efe18ff5115f1978bca749335ae4bba099be71
SHA512b0aeba82ec639cea2864a811b664f2738cfd3c032fdf469895f8666832ce5f9ff1490076c5df2179eb6976ace4d7194cb0e22416471625790680aff5880b0c9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d83150def276e55384e4bb56ad026276
SHA1fffc4725456da862dc6783f3b56c908eebed6616
SHA256424d679decd35ad240ca1d6438f713388a82fb11dabd23c9e7aa6c0c43ebcfca
SHA51223302ddf19dd6b1d542e568d2277330ee1a70ad96e887c2c0a53e946cbc8b1306f831d124679ef127788d17d1a48be0218a1a7c3054f30fb9191a17f2ce71595
-
Filesize
1KB
MD52d3d0e2db1eed7b236bd1ebcf5aea129
SHA16b25c94bd08587ddd4792a5999c9f831e4449537
SHA2562ac2ffaf403f67637c0926f598be8b12901dc2a20cc2a55b431de76f554a15fb
SHA51230ca05c7fe8b0e35493d0f2edaafeb8fa59e4925df796b0e3486f047b1c91405eb64d0858631217f33a80ec85939c7d5d0933301167e92ef36361b4509ee8a16
-
Filesize
5KB
MD55c68817cad934aab01ee2623bca2fe39
SHA1df3172e0aa76cdb7ceb2ef4a589f5929fb0f7051
SHA256fdfea5faa83f01f9fde4e67c7643e00182c6dd36f66a894c27c0a0b65d16e821
SHA512a0bc6e30f3ccdc2db08399bc4d4ad0151a81ae5888a09b53c00cd62df821394f85f4e86bb6ce67c8f7a45287fa2cbff4b7d252232e78b696532c21a5dd2de8a6
-
Filesize
6KB
MD56da54f81bea543282a1d66554e9d5020
SHA18c594463772a9f14a7cb645f63d9650091bdd074
SHA256d3ee71019f843a5ec4fdddc1b419796a5b33572af5ec4b0086d43b9032886a5a
SHA5126db83e724a91596567ae5412958f454e15a20dc03c492a431dbc379c219323a6df37e4254178864a8ecc9714c113477a5fb50145168e29b612fb904586a9171f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c0563df39abf960e3d93c7790ea45786
SHA19ca788be1f045e545be3fdb6683da41b953cfbac
SHA256082f361cf58924ff5a8483a2fcd3de066a1384a3387de82e709ac9b57c2d32ae
SHA512d66b9ac1be08afcd76146b283cdca9c44e6ca6e806d6bf2ea01a1e1c1d46dfbb5c01d139b3ed12d014fc74878db3b5954155a1bed545a6b0e0a78f0e6f9b58bd