Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html
-
Size
35KB
-
MD5
5d6b027998bc82db1af10ad03e7d87ca
-
SHA1
539a865b83ac24f054d25491d462a6edeb85d320
-
SHA256
6d082d2a43a5553a41b948e9852b09ddc1879f0027a80d8a1d82aa0e857acb6e
-
SHA512
3e94fb4e0cce4ad1e6b7e3ab11b1d46871fb07c744a479bffcf3a14487bd6247156072ca30e9136216a942ed1889b297ad81d298bfcb4ee502ada3e7c169b9f2
-
SSDEEP
768:SW3kMESPjYqnMJ2AAyhS6PEyzTAmYiC/7BzR70JM9dkc:SW0uPjYqnMJ2AAyhS6PEyzTAmYiw7BVz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 2164 msedge.exe 2164 msedge.exe 1188 identity_helper.exe 1188 identity_helper.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3312 2164 msedge.exe 84 PID 2164 wrote to memory of 3312 2164 msedge.exe 84 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 2932 2164 msedge.exe 85 PID 2164 wrote to memory of 4064 2164 msedge.exe 86 PID 2164 wrote to memory of 4064 2164 msedge.exe 86 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87 PID 2164 wrote to memory of 2940 2164 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd875a46f8,0x7ffd875a4708,0x7ffd875a47182⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6928 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,2523860610632467687,2491140400617565841,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD522b27d8e1335984711d1c75238f64c2a
SHA17cac00a696e0f51797b67e81cdc5ab9c4f415b45
SHA2563a697f72ba33e9a968c26e06328fc4932d445f097a83b8b661d44e6f4222b8f8
SHA512c45b95e9ad62a0bf263dc2854bcd925a3a902e055e09656411870bdcfd024f7d34392fa1c18d209dd7aca4a11bf82432fbdd801ea84a2b730490208750cebb8e
-
Filesize
1KB
MD575cd676fb4690d90e44597093543a1ee
SHA196f7de6a0a57c3b07337b8cb6ee80212fe615ef9
SHA25618bb40eeb2c9d7384ad5a87468c636c63ad6fd1a8b563252c1def3781aa4b756
SHA51275fc8ecfc3a08f579f85123b7d21297da53d82d2dcaaf692773e1265cdbe13ecbf6480ad518ad07e6261cabfa0b6649714774add38014d31aa2394d73b161eb7
-
Filesize
6KB
MD53f4e85d1e4159165d69aa9414d4b923f
SHA1a0cf2c4eb07e6f750f63c9d2f17dcc22ad4b89ca
SHA2563b5eb3322b972ad1bcbf79ed9cf5c402f31e80db3e10787545d06bd2aae280b9
SHA512550360b111359bf2e0308891263c8c35366a32fdf7283edfbde127c1acfa9fd6be8ecf0e8a146565d0ad4dd50cd0729259cf4751dc88d01bc4faf5054a1f3504
-
Filesize
6KB
MD58286292fcd6b5df888ff05f15f3c3da6
SHA1984844e1660d83ccf4ec87283343af85b9871256
SHA256530702ba5edd83b62986ca6d3059d66b6c355609e6593e490f88241c05987733
SHA512fd087f1f42987571ebfad29dd13d5668645991c3d09a9a787a09edf5f0cdc0d39f75e0a9b621485926e127259799665a7542a6f4c2a804c827adda0c9be77068
-
Filesize
5KB
MD55cc6d070299d3947aaf2d176ba4de5c7
SHA1a2312a952ec9bfc9946b61056f8321cf6e12604c
SHA256bdd0aa5b68b9e9f6c7974c383a40ecf1e73ac838ec2f40c0c531125dd18b22f5
SHA512100506f034758439917eba0b1348a05a50e828d65de9d0969755c3ee954d244ce0eb5184ddfcf55b76c8d76aae8478c6333b36579756601dfd53a3f78bea549b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ce463818bff4827a13baeb1b22b1301f
SHA18370d7da978bf994f5365168b7d05501e9053973
SHA25685c7412ba52d69f26f169ad6d33d3eeaf833ed390fd1e542b79714cdebda7882
SHA512d32471040b565e29f031ea5d4ab5c5e970469fe08f1c5a4f61aa8bca1da95e3a4a16216a28781282102030055352418713359c8559dda4f5b1b4aaf9834629bd