Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
7e33d0c8ac06ce3efba818afd948af2a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7e33d0c8ac06ce3efba818afd948af2a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
7e33d0c8ac06ce3efba818afd948af2a_JaffaCakes118.html
-
Size
47KB
-
MD5
7e33d0c8ac06ce3efba818afd948af2a
-
SHA1
181daf9e3837dbbf5511eedd18bb519d2d19193b
-
SHA256
aeb43dd14328cfb579ae9de6d8e4ba7a699afbead10faf0c0dad9082531df8d2
-
SHA512
9675739d500f0c64b892076e035ea55daf4f94f4b3f406c975a75d0a1b6cc8416ff15e8ee7da8173bec6582e081e2190a481b6602a39159abf3caf77f127fb57
-
SSDEEP
768:SygdkkTyjrY61pves/oES6PW/ZBzR70U09dkc:SCkePY61pv3/oES6PUZBV70UEkc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 3960 msedge.exe 3960 msedge.exe 1356 identity_helper.exe 1356 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 2196 3960 msedge.exe 85 PID 3960 wrote to memory of 2196 3960 msedge.exe 85 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 4912 3960 msedge.exe 86 PID 3960 wrote to memory of 2488 3960 msedge.exe 87 PID 3960 wrote to memory of 2488 3960 msedge.exe 87 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88 PID 3960 wrote to memory of 4220 3960 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7e33d0c8ac06ce3efba818afd948af2a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8e4a46f8,0x7ffd8e4a4708,0x7ffd8e4a47182⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2368 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6672 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10965548222206352471,13238275720773017425,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5a3f9c47dd0816f118820afc91c149406
SHA185a129180e5431859aaa04dcbb0e6de9dcea7d53
SHA256b1fe3b223a4e5b17b630f92eaf37d7ed2ed2c10ad030c93fdba9509808a0b630
SHA5128e27b90ef5d12d342c93eb5f09ffd98c7d1b8fd309a58dbc5e27053332c3514b3a25fe971d7b4ec14c651575491d4a70065ac63548ae481cafc63ffc50b66a13
-
Filesize
1KB
MD561cc1257d7705474c47c808d22a29b19
SHA1615b98796596bcf642a56968d8881cc3ae67220f
SHA25643885a0e747d8dff20a171ce45f55c4d2712fb71799cd6dd719c70506af95227
SHA5128092539a60d2a038e6b66d077bcf8243224814e7f1bd930c56430170857c5e3ef1df0eb9c467f38bd258940cfa9b71031c0b21a5cfd5446a5e8933b5664ea272
-
Filesize
6KB
MD5979beef9037f81a579db5a03291d1c59
SHA1844d101d7a62b436e09e108799d87bda14c5d23f
SHA256d994d8ab8c373d75e57b0110f89e1c7796a6c7ec65d4261e346737a82b4e0618
SHA51299186c63457a2f3105d25ddb875f160600096e446b2d645550f8d556e5f16427087f114d9f94054e1b0b7860dc14d051b2339eb9b8b8873b242495478fd32e12
-
Filesize
5KB
MD5976421d561417af56db4cf6a29d73f1e
SHA17e1f318f26af19ab0bd3a70235d96eac2344ea5c
SHA256033942f8aa38800d4ebdca9823abfd844a4935addc156a091892194e7ec5311c
SHA512b97a30d5949017e3c1384116e7ddd192d4a002e744dbaf3e56a3474af50181d6f9e389f03f9c92ebcc741eeab45f8f99070c1695a498327d1b5899212b5283ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50af371036572acacac639fe2655e7f77
SHA1e973e6fce1f5dff2e0bc8c9a9eeee5ac5e81c253
SHA256c9be88d8fffced99a1f17b90612ff87d708fb920992a728e16606ee16062c200
SHA512a1c2d034c995cc9516a0e13bde43429e5005c81aedc10ce703b134c7cdef53a209ed57472d7ad1209b73711a1b4eaebbf8df019a2d2394dc243b0f07db319bb4