Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
820d3ae8c7d7faea762616479f629866_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
820d3ae8c7d7faea762616479f629866_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
820d3ae8c7d7faea762616479f629866_JaffaCakes118.html
-
Size
232KB
-
MD5
820d3ae8c7d7faea762616479f629866
-
SHA1
8e3378b6f03931042b7f4c0e6411d7baf99b73a9
-
SHA256
dabd656e97d00412673525077758e448bf21ca88ab6ff25490cd735b4d850f36
-
SHA512
36a19c5b3e51ec8e52c85fc11d491fba27e97c4d77db76bbf43975e3e3765e5a0d4b2381aa119d42b8a913d25db5760a7354c0625c990f14bc80b5577b5791b3
-
SSDEEP
6144:Uklc6klcBklc7uG/bI+33kcbklcPEijZeqhlEijZeqLJuwpGg2Bu:Uklc6klcBklc7uG/bI+33kcbklcPEijV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4880 msedge.exe 4880 msedge.exe 1944 msedge.exe 1944 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1944 wrote to memory of 4968 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4968 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4044 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4880 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 4880 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe PID 1944 wrote to memory of 1580 1944 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\820d3ae8c7d7faea762616479f629866_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e0746f8,0x7ff92e074708,0x7ff92e0747182⤵PID:4968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2108 /prefetch:12⤵PID:960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:1308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,224742084132046135,12785976220804881219,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
20KB
MD505197e9427acea2ac4dc812f97a8f078
SHA13d2a38b79da52e57783360f195ac3e7c85edefd8
SHA2567bdfd36b4f017340dbc84a310014381bfd3028416ff21c54f7ce0a35cfd38191
SHA512084d4febc28358d3ba6b0bef400f637b7f350381b8b592b1e412dd860d5aaf034c03ecfa87a064cb19dd8a42faade23c260e35a8660791011b7e51b726418ead
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD520f2b5d3f3766b201b921237544350ef
SHA179a7f65c8cfb6ee8638c3602fd6e353152a5da9e
SHA256347d68eb3ba389a62d22e9fce5c3d33015f7a23e991c6977708533de339a834b
SHA5126ac969eecc5e9f99fba8e8c4c354f8d3a7f20305a856adf506956331ebbf21b5737730b44d3b25c6a0bbd993c48841fc3b9e575e9ea17e60af589ee4ff57347e
-
Filesize
364B
MD5613871f98e7d11edd311814641002af0
SHA198b28368b65c844e8d3aa04d1295439297e88dfb
SHA2561998e5e8af4f3e945f6e24f9b346d19ce312b37edebe14c544ebe491f2825552
SHA512aace5e5071e44c25b91992964c054b9661b690947ed293ec701481d71cee0ef48461030e503e73370e693a09f7e1006e9b5f5131af6cb58a4e1a29debffc3439
-
Filesize
1018B
MD5827234d80478e7938e6b6f6cfe520050
SHA199081b6ea4e1a1d3353403af00ed2848afd493aa
SHA2567bf5f986f339cf48c33a5bfac01ef88245430483c1ecf05281998d881c504082
SHA512ab5ad85396facdc32b5d7ff1bb404c6931b5c95a9ccc223aefd8db808ada019bef5e6dd6fe382ef8a9eacc87818c1e5f7cf86e0984d39be86f49410e3d8cc5b8
-
Filesize
5KB
MD543da87421a48f612a5faf557330c05fb
SHA1078cb6fd219eed6caaff3e04c3a6bf7c2413d191
SHA2568dc14a2df60e7c6efbd90f733e8bb31f381e8132a5f7716a992fc34827572c3e
SHA5125f9834429e772a0d1959a5831d6a16a21fc27f2cf9cefda4676521d5b851cb217d6baaa9f654253486156fb1cb7ff5d50246b8cca591a27213a3949ba83629b8
-
Filesize
6KB
MD56cbf17fcc75381fd5d35863e2bc78c23
SHA1f73deeb905bcd7a9df641208bb1c447f703e677e
SHA2560e6c4ca924dea0b41fdea25d932178a0b9efcbaf64eb4fb63d5571e6df71d181
SHA512819db148dc26bfc4fa07538ef41c7950e0d7f0f8cabcdb9fe624d615bf9f30dece1a3acf2b77a6e55082f7ee08d49709efd3d6bda30413b64f90b66995a65587
-
Filesize
7KB
MD5c2264fb1cdd09123d002c11f90b28c36
SHA1b6ea697ad402ea1476e57a605696ce49cdf8b621
SHA2562619b0d43d31c7b5225fbe142b8ebbfa144b26290dba160a279c80cecb724480
SHA512403415f3b784321b414a6e6370e18dff24092cdc88823754d88092e5fe6f83c188be0a1d9df381b996c59d6a606931ef5ed6a15e67e31aa7d37353fefa381c80
-
Filesize
10KB
MD5524493651d1ef81f444102f7204fd416
SHA1d4153613386aa601edf0adcb0396bc4f1b760b2f
SHA2566484c3bc72b5edb8385869a0137fa482b72bdca0073b3252a9a3951bc8865fa9
SHA512b17c087bf8e08b82bb19d4176028d4402725b808b9bc92e44661e7a16f7afbcec31e2c27ea8f9a05462cc5bad58c20600bedf8386bd2f0b0858ae29231da185e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e