Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
5e7d70c12f393b4d8bc1b6a8118d30a1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e7d70c12f393b4d8bc1b6a8118d30a1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5e7d70c12f393b4d8bc1b6a8118d30a1_JaffaCakes118.html
-
Size
227KB
-
MD5
5e7d70c12f393b4d8bc1b6a8118d30a1
-
SHA1
d6fe02094feb09c8b3289eb65642ffbd02e914a4
-
SHA256
c4ab31d701065685a561405ec0669a2a60e5d3ce31a18667f4d14969d011e61e
-
SHA512
34b81ca650c78489fb57c6ed62e3a9954ee97bf6281d30c4c17c5a5896f01558e868c986b31ee93f23dc57d0104dda53136159b8309947563991d37dba22dab0
-
SSDEEP
3072:BQuzrxeDSye3+Jv1t8aNFVeluyqE2fF2bM4uN6MrkPuKbuU:KuzruSye3+3t8aNFV3Ve
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 2476 msedge.exe 2476 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3708 2476 msedge.exe 84 PID 2476 wrote to memory of 3708 2476 msedge.exe 84 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 744 2476 msedge.exe 85 PID 2476 wrote to memory of 4064 2476 msedge.exe 86 PID 2476 wrote to memory of 4064 2476 msedge.exe 86 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87 PID 2476 wrote to memory of 3944 2476 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e7d70c12f393b4d8bc1b6a8118d30a1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff094d46f8,0x7fff094d4708,0x7fff094d47182⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5794644528818192602,15898180747043744227,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
20KB
MD505197e9427acea2ac4dc812f97a8f078
SHA13d2a38b79da52e57783360f195ac3e7c85edefd8
SHA2567bdfd36b4f017340dbc84a310014381bfd3028416ff21c54f7ce0a35cfd38191
SHA512084d4febc28358d3ba6b0bef400f637b7f350381b8b592b1e412dd860d5aaf034c03ecfa87a064cb19dd8a42faade23c260e35a8660791011b7e51b726418ead
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD54219b1b98896cadb54b812b9844ea331
SHA16d5007db53cd472de1768b03c795dd47d637508c
SHA25635a6aed11df4645dbe110c9544721776e65ef829100e01b51a2834feb75816c0
SHA512d951fc21b85880dcdcba5b39eb94f3b6f64e4c5067086390644ffbf943e6cb5f754a8365261da4d1f50780391da135a4cd1568ed8b0af370429026f5378b737b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD59ab6e676b3440176ee70c83be0a2a308
SHA1d89695d6e4be7f39708c379796d23a1684cc5da1
SHA25694034dbeff069f81556a1a84ce968f332952bdb179dde3a24b73faa072356893
SHA5123956de9a3aedd3a9dd901b98eddd6c18b26a33b6fe6b983981f0925de231d79a8cdec72879df906078a7888106957f3e36b966f6babfd10d36d3ac58a0867b73
-
Filesize
2KB
MD5146aa47fde2117dfd3b9e569fec7f95a
SHA1a3696f9321463e6e0a16b6e14e29ce6a98bee62a
SHA2569f4ed8b98be28483b5a7c94d795ca6c527f193ef1e23957a1eb635044b56b693
SHA51274786d58380958b7b6a29df140d0b6b7d7f27c6cd6e6ea1883430b3455cc878a931e15dfb738cad8d56676e4592717dcaf64206b8e3f090449ea33655bb6a0aa
-
Filesize
7KB
MD5bdd67fc3fa03d3da6743dba9538bd7eb
SHA1b95878b38258e1037754e6882bc62c4ca4041873
SHA256b4f8649f4991603f2e560e427d6320d743b1e855292f85278710bb4d614c65ed
SHA512e0f0215e5c4e29b3612ef4e4d9f42ed00e41f8fd7d323a40a590a566b9f4180471860af25a36a08efd153e9d48b5220125408e4afff5e72769b008244d97911a
-
Filesize
5KB
MD58644779a9b58f7b410541f9c535bb91b
SHA10c7f220213d0f5ac137ec073ddcecfadc16ee10f
SHA256c6585e5f9077f07892749fc7330692a273978559711b8d4ae2c477e59d281e00
SHA512c78aa1d95bc69a288b597eb7191b9579188ed7e689d9acc3b08b24aa4a6cb67cfe883ede0cd5b61d857ad3f60ee10fa3921b68938ab62c57858d646df24de3e0
-
Filesize
10KB
MD51a64090d5a44890943a6c9dc6ada5d1c
SHA19dc9424df20953c032a8e5c2539c0007bc64418e
SHA2561e050560f52f4faa8d2d46b2d97569945c0e7bf344e5b15fea3c853a2f5f1b02
SHA5122279274f69d87b6d243925cdd748c8826a86096353e90f4cf80fb8eb6bb9125595ef04725425f501c52c529bce8b15c7b20129ad6c2526fbd23f69ab6f686430