Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
7c33ebeabbec9081f245d83ab438edc4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c33ebeabbec9081f245d83ab438edc4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
7c33ebeabbec9081f245d83ab438edc4_JaffaCakes118.html
-
Size
77KB
-
MD5
7c33ebeabbec9081f245d83ab438edc4
-
SHA1
84104f15dd104ace6f558f3fe6684901426b784b
-
SHA256
0edf06bf7121774f0cd0c835bfe7be1915797b7fd7235be97f332501666a6c91
-
SHA512
a49098d4da3f2081c6a95f191cd980dcbe60808bce9931d692a980935d9d829e256f0f8192318481056687c2f9a9abaabe6a8ddba45079eb13f21df2d410b7cf
-
SSDEEP
1536:jBeIMLnVXkIkIkIkIkIkIkIkIkIkIkIkIkIkwkwkwkwkwkwkwkwkwkwkwkFVklOE:ZMLVEklmQYArI7OSlu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 4480 msedge.exe 4480 msedge.exe 1168 identity_helper.exe 1168 identity_helper.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 2336 4480 msedge.exe 84 PID 4480 wrote to memory of 2336 4480 msedge.exe 84 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 4808 4480 msedge.exe 85 PID 4480 wrote to memory of 1668 4480 msedge.exe 86 PID 4480 wrote to memory of 1668 4480 msedge.exe 86 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87 PID 4480 wrote to memory of 1172 4480 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7c33ebeabbec9081f245d83ab438edc4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff911c046f8,0x7ff911c04708,0x7ff911c047182⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:22⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1820 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2352,4868026705192349818,9060483300295702555,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD54aed347342d9b40218616cf46cfa1ddd
SHA1bfd32938b3cbb672b30e3900edfec42f90c7b5e6
SHA2563c7c13c5fec7a300a83eaca5b66e002ccfee588b3d4e1ac18f064f199518b617
SHA51238f3c25f851db9a52c4ba92d14a71db4a4244e0222b473628b7bf3a60704d6ef9af83c20da2dfd718ab76960b9e9389b624045f40b85efa0126baa5bdd939d6c
-
Filesize
1KB
MD55b8e81534092203b804d2abc893ae716
SHA12650869d6f822e0338a924317492c68050185e96
SHA25612f311464985ee5d35e936f6bff7b005ea911854549782f9686d585491fbceba
SHA5127bb8dffa831512d4b6d055673275269039c04da91443d63ff890626c4df9e7470a32bf0ea518cc53973dd8b562da3066060fd14b145c0c21be54bce7e0d53918
-
Filesize
6KB
MD5eeb71c71c3ae7d7737e0b0daa3d43d4e
SHA1e50b9480f1f03f32268390a34fb80474ee8d63a5
SHA256101be03f0ada1bd9e6b220f89119c9080414a19d13cbc82d3b07e9ae13df8473
SHA512d183b77d70ba836b1a9d1ea7529a2c0c3eb4d74bfb0b83cf5e0a7d750e4e537794290b97629db4dd4cda8d14c5ce8228546593f66eca8a473b87aa9819f91075
-
Filesize
5KB
MD51699db580ef36416a2b72c040e74b9ac
SHA127b9301a8e26218aa1b1e969db80b0955674a444
SHA256dc9b3cc8ce8194d00a145bdf02cff2b6d732741677cac7c6dd74b031c3ad015d
SHA512b92d7624a71a3a586e7d2a038354262a2dcccdedff7cc825306c657cdbafb8486e772842e0bd7ce1c81b7c28d08444f7527e225179eecb7d255e55af4e58df99
-
Filesize
6KB
MD52c0ea831fb71f0b0bb783f23a9827900
SHA111205e144ec763f21e52eceede2efa5b7932657f
SHA2563c04e5e93ce401e980e4d1d8d91e58d23d8ffb8344001b2171580c7222bae179
SHA5129b75dfb026bb471dd858368a2c2bdcb4ed8b9fb16559e267c2c197d675b592f03604ab67eda85c76d82ff09a28b8710714ff2e9b25c9f322d5baa0c658db9677
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54288de4f9d73a2a3a88e2ceb54d72790
SHA1c5e3ab334ee51816fe3836d49d3262525151f5ee
SHA2567fe4efc3ea94831b248f661b3768fb09c881b2c64ec03d1780c9f531c7df381f
SHA512c575de1958b61adcaf0dcf4a54976abd75d9237b64b090ec222c72d64ddd3e1b205e95e816886564de4b3eef7fa86a38e24b2c7720ee69864ce26ae82a36c45c