Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
8274ed4e5a7d05f24789b9397f188848_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8274ed4e5a7d05f24789b9397f188848_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8274ed4e5a7d05f24789b9397f188848_JaffaCakes118.html
-
Size
58KB
-
MD5
8274ed4e5a7d05f24789b9397f188848
-
SHA1
c9ba90fab09cbbb8327d13e12bcdf1a3e767b09a
-
SHA256
a210d3d7b7176389a461d76c1a43990d1d00719114833bd3d7e89353ff900238
-
SHA512
b3b14ba96bfe9b3c3604905980aec7088e0a593560697f9db22a1db40ef4dfe50852d5d6152146741f2b470df853a7fcbb9df68d825f1dd42d286402083a072b
-
SSDEEP
1536:gQZBCCOd40IxCKIcUf0fGfPfyfwfXf6fSfEf9ftfgfnfHfQfHfjflf7f9fOf0Ffy:gk2C0Ix4cu36Y/yqc1lY/vYvL9Dlm8Fq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 4212 msedge.exe 4212 msedge.exe 3384 identity_helper.exe 3384 identity_helper.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1336 4212 msedge.exe 84 PID 4212 wrote to memory of 1336 4212 msedge.exe 84 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 1996 4212 msedge.exe 85 PID 4212 wrote to memory of 2180 4212 msedge.exe 86 PID 4212 wrote to memory of 2180 4212 msedge.exe 86 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87 PID 4212 wrote to memory of 3676 4212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\8274ed4e5a7d05f24789b9397f188848_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce88746f8,0x7ffce8874708,0x7ffce88747182⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,13888135377342435943,3106365176898767389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5f390871b54e08bd6e4070c8fa6a8976b
SHA1a65809a2a5e58f5ebb62df15ec2c4a5d33207cfe
SHA256115bb4f4408190d8b38b23772015e74b82e2f1afb30a2582f20d84a87a212444
SHA512ba730e2f30370e913a456246b3f21466e7e42cba3d5475e89d0f0595af9f670c8c4f8af1bca1db35a01f678dc81345b8411d3cf0b5b554347f10609e4bb33b73
-
Filesize
1KB
MD5bda4b7541a63ec8e2396ac1f93ea2431
SHA10a93e3e520d1a5d05d95956fe5bd5a096c2603e2
SHA2562c0707930eecd270d7b91773adb0b7830f860fb2d42220ecfeb17299bb82ad0b
SHA5127c1677411b8ea1b8fcd0e7fd2083f9d2402a9b2b87599f2ce14bbe10d03c86daf522c56d055cf3caeb2514909ba818c5cfb20a9b366f474e9ec6e744358d09bc
-
Filesize
6KB
MD58099eab9ece8532515f7a2b941a6c49d
SHA1595ffd0d76f70179643e12f63222fb2b0f4b7918
SHA256e16e250295cd0f92f1ec91da6f11e463e2fe6e674750f0ee63edf84daaf38734
SHA5128ba51cf2ff1d39bf1be1c873d8b42049ed95d88737c2a5212c4efe23f6784dbe901531a6a988e2b738e0aa4c8ca10c6d7d0bd0d92d874e4e4a5d38ae4bfed472
-
Filesize
5KB
MD575d28d02b636a81884add0464e61237f
SHA123a3d71b3f85cabf4071413411fef495e22be3ad
SHA25655ab942e875090bbb88363c2d0cb9c7f9b48d80c8a1dd52df9f13ebf0bdcd46a
SHA51271c8945a7f160603822dc76e6d11c970f34b55a4737894ca9451e1c5b658b50b98dbe506d27b8cc7c516a2351f5e2a25e9a4e5e763e89defa318880081e85809
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54d1ce775e851f96da889eedd8f76af05
SHA1d88fad7387776b8cc5e1c3311d78e0e821815145
SHA256f649fcf45cf917aec52b542714e313c086ff297b12746dba0fc6c709a286cc61
SHA5128cdebfd842cc55fba1c00b6ba947715665e3f94e530f11065c11c9370d343df0516a088e6ed8e367c43ed311880871d1adbd7e521f2a554239025528e741517f