Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
5d159dabd2fa28f92a2e6bf3d48ee473_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d159dabd2fa28f92a2e6bf3d48ee473_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5d159dabd2fa28f92a2e6bf3d48ee473_JaffaCakes118.html
-
Size
96KB
-
MD5
5d159dabd2fa28f92a2e6bf3d48ee473
-
SHA1
d6ea70e8af66034a22b1ce8d20bce0897d356277
-
SHA256
5bab672e9fc87d92f799d7905c7be8d534e9b6c3decc54fbdd363d5088587a8f
-
SHA512
c5c976e7c14698159bef6b8023ed11c18538c3dc9198784f63d84402cccb08bbdff31a5a73eb942bc596fbde99dba82e8ab2ad326585ffb91002d8a9ccd7f2ae
-
SSDEEP
3072:l3ykKL+dmdHqlLVzt8aNAGb1ThxrM1LoYXlUP8Qg:1ykDFt8aNAGHP8x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 2732 msedge.exe 2732 msedge.exe 2776 identity_helper.exe 2776 identity_helper.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 4940 2732 msedge.exe 85 PID 2732 wrote to memory of 4940 2732 msedge.exe 85 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 316 2732 msedge.exe 86 PID 2732 wrote to memory of 3976 2732 msedge.exe 87 PID 2732 wrote to memory of 3976 2732 msedge.exe 87 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88 PID 2732 wrote to memory of 220 2732 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d159dabd2fa28f92a2e6bf3d48ee473_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa048146f8,0x7ffa04814708,0x7ffa048147182⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3752 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,16478804689715298892,18300262092728303425,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f721611e29482234321d0c91941cf84a
SHA15247f0ac29e3e828151e02aff2519515c501a329
SHA25687fa4c4899cb2ad9127aafcec9bbc94475ecd8714d1f0cf4c9496f251ece0634
SHA5123b7c7189977af17902c0ee5ffc81d78f6f1092cfa5aea025d66adffb15c89fe5c7ea788a27c1dacba495cc5b70455dcdd92072f98018323ab15235a8fe3a089d
-
Filesize
1KB
MD556be178feb8de4f86539c3fef5aa8252
SHA183375f58a7525c4a35983efd90541a40be59b905
SHA256f03eb546f73dea03ad3ddc30c9e312491b2b8535e7e452bbb162d5806dc81ff0
SHA5127a9f7144caa269d62f2ad7f9b71e84cf3d9e13634fa61ff0af446e92a33088f8fd0006175ee70d25ebb3a33613f5be933b6a4dd49934eae76d2a7e73c8163301
-
Filesize
7KB
MD5ada1dc69d4aedf28e2137370163599c8
SHA1d93b91d606456d474feaf2b0451ff43b2023afcc
SHA256b049b63d976e6120ed79181ee6df1e37a797e6a12b0be63bad512413c1ffc307
SHA5124282c5d0ae7df02104358c4ce73ae40ef550154af6b0aa556c88f25a00b35b01dd78d59947847aa07db802ae3b5b1945c7722f39520ea398845988a4f2acafda
-
Filesize
5KB
MD5ed692f1f08cc02420f849047c3d8e4d1
SHA1acf2eaf1d74287d6c228ad17481e15085f8e0ee9
SHA2569484f0571d7808a8e0a15893af15402aee88b470ebb65df2768a52d685fd7ec4
SHA51202e27444c6e85588906907922a1aa8e885ffb79e07bee28e4d299e5f618797ca6b314fec19c23c06dc794620f371dd79c202db9ca82bb0f138aa5ddb244fec81
-
Filesize
6KB
MD5a829aa773d7b7645493335b443431d27
SHA135b3f06f59c4cd209fbf10f0ff51aa5f68101769
SHA25632838e2016a0ad54ea8cbf1639fdfdecbad007c7000b0610caaf3fffc3f3caeb
SHA51240080f0e8828a3e18fc14d7cc67c93ed932104c06df5b93665446dcf979f71c839c49ab8cd0cbebfbb6334445754eaa95d5e09e6fd8a37b80479d0dca5cdd2cf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e2c78c20b06123b2d7aa70c985a2f739
SHA1086bdbe1bb5615997cd5e7d262ff7484192dfa0b
SHA256000fb3cf8e8a9e5caf0fba7097c1fdff0db3e96e5a05cf60252b1b5d7309787c
SHA5124779c120f95d0283a9f766287fca2ea78351628901f054faef7c597fadd6a41a42e609f225f92c9e9bf11c3fe3d578826d81cae18a5efad17c61f9e56905c9a9