Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
575a2d652bd57e1d2263564784a1e92c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
575a2d652bd57e1d2263564784a1e92c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
575a2d652bd57e1d2263564784a1e92c_JaffaCakes118.html
-
Size
170KB
-
MD5
575a2d652bd57e1d2263564784a1e92c
-
SHA1
b151b37c867480b31fe1aa96836dcacedf203f60
-
SHA256
7361a792455efc933017cc296178a4e281bb97ae30633a4d7ed6dce2ac595dc4
-
SHA512
462ba807b1b56bb9241ed1e9b2950f94c35b4bb2da2fc5783db9c9fcb807de21a7cca54b94cae8e01da149253a1dfad8a8e676e3f25b22d9fb4c260e96f56c7d
-
SSDEEP
3072:6gEru+Pd+R+g+I9a+8+0l6E+1+T+jC+4Q+VioTTAz40l6WNyq8FGFQHM:ZEru+V+R+g+I9a+8+0F+1+T+jC+4Q+4j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 408 msedge.exe 408 msedge.exe 1472 msedge.exe 1472 msedge.exe 2324 identity_helper.exe 2324 identity_helper.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2588 1472 msedge.exe 84 PID 1472 wrote to memory of 2588 1472 msedge.exe 84 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 1424 1472 msedge.exe 85 PID 1472 wrote to memory of 408 1472 msedge.exe 86 PID 1472 wrote to memory of 408 1472 msedge.exe 86 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87 PID 1472 wrote to memory of 1536 1472 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\575a2d652bd57e1d2263564784a1e92c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8266946f8,0x7ff826694708,0x7ff8266947182⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16526655138148161308,2555035357985476033,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e612374deb975cb7ed0c548feef2fbed
SHA18efb8b10fb1cef5c33abea59b7792e24db6513b2
SHA2565cc86e03b17837c91edbb47896fec0383f133e464c44148466aacb6b149a6ae7
SHA51268edfcc7df29ae30355a3b97be602f6ed0b7f5bcdac39d0c79d0df01ebc13039f6ea1e43db06a672a28c6b43722a6f5b715f3d99555eb8ea7439eafce9f3c613
-
Filesize
2KB
MD56cd1766692068e9b9d98535e15c6e73f
SHA1a6689be356aae7a6495889887fd581a3d4728514
SHA2569c23ddfd3ce80d7154ee855a117313d4ea539e721923b761c81b386f44e0c3a0
SHA5127653673c6b230efc9477948167821b98d584b66f88499bb4d4cf2e000310dbcb77addec30b5f1b1b3e65718f00d381d008f8b6e20db13f72844d9def9de27750
-
Filesize
5KB
MD596e758cc38bfb125a0eca1170a1a75b9
SHA15e4cdf03b83c51f2ca99d3caeaa81510a68377b6
SHA2566c143c17f5309ab56f754e7a61800cd82f8a90338ba74a070b5b2ef47fb61a4a
SHA512fa0aadfbdb1afe14c6d139a6ee55381aaec2f3f9e17446257906d446adaefe97bce1db60ed8ea7f4dde72c2fbc98d2e7b33af5303cd272f4467783d804b019ac
-
Filesize
6KB
MD51a088aec1403dc9bf84aa75e551a0fdd
SHA167de0f717d5921ce1e5df707696c64e57a74eab1
SHA256a68e434f8d039adc4e32173c59415523d723f8842b20fbf75c1eed91f2d78ef9
SHA5120a4912763f34e647459c5cd95afbbc394bf61d31e74bf1c5df995ff802d8208c88eaf706effed1d1bc4adc04b0e6d8073bec386be8558cd6f9861edd023b9535
-
Filesize
6KB
MD57c5ab335e10043be09ddb0aa12ab000d
SHA1f1bc012f25cb8e7f1c13602be4286488e23763e9
SHA2564bb31f91ee35d8294fd666ddcc293cd2cf328dc1dc1e49154a326b418673ee7d
SHA5125e9922d3e69d40e42860495b7a7f64a8a288c73d2b3738521332c81f138a094446f4cbdab8ae19d849cab3d2c8b596ed66326152012216445903d01a7aa997fe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5455de6bedc65de3cbc436edb30959856
SHA1abc8ed7bca8aaa10ecd28ec7a5d6eeb9b6a596c5
SHA256aa87a1f86c657bcfe2717a8bcafca8ae865e97011b077239e59e8e2b70fc13ca
SHA51299e803e64b9f2a0e841eef17924a23979784c95c12dc2924cef456f25b9d8fd109313c1e1086636f3cb393a9bb9be820845ce740dbfd723906f91bf2c2ba98c5