Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
845693c52f0d7405239adca1ef0448bf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
845693c52f0d7405239adca1ef0448bf_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
845693c52f0d7405239adca1ef0448bf_JaffaCakes118.html
-
Size
241KB
-
MD5
845693c52f0d7405239adca1ef0448bf
-
SHA1
b51b3e0d4127309efa21944f043e9f4d9db0aba6
-
SHA256
b61b4508562052c08ff4f8fdc96faf6fd935982f207121be31fde9eb26b54604
-
SHA512
9d5baeba0e5c07983a234b5beaeac2bc389d140c7864123759bdbf48ddfc73b724ac93b216be4a4b5f71166abc0c6530ae3cf21187be775419d3a23ace865e96
-
SSDEEP
6144:v+RELVzhXkA3d8VZQvzwV2lms5JBpknvjXGXgcH6+IVKQC:GRELVzhXkAN8VZQLfh5JBpknvjXGXgcL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 4440 msedge.exe 4440 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1664 4440 msedge.exe 83 PID 4440 wrote to memory of 1664 4440 msedge.exe 83 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 4436 4440 msedge.exe 85 PID 4440 wrote to memory of 1976 4440 msedge.exe 86 PID 4440 wrote to memory of 1976 4440 msedge.exe 86 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87 PID 4440 wrote to memory of 4408 4440 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\845693c52f0d7405239adca1ef0448bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffbd1d246f8,0x7ffbd1d24708,0x7ffbd1d247182⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2500 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5046276504338115380,10953065381727268970,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
42KB
MD5101f2295c59a6c129b95bb68093aed06
SHA112f5843daaf99bdb874dfebaf10660c54ede2120
SHA2569b59525954d9da17ff56cac0c0cda55bb6c4df6b7550fe68565fe0d24a963ac7
SHA512f5e54b7609a1884253f1d05d9245def95b3721e1163ddabb6d32f5b31f824a218c60533eef25a6f91d8ae6fa314128ae258fdc341cf9a4f36bf378e874b5277f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5d7f184084534a78258be79129af45500
SHA14c58384c9e33737def879ee34c58f9a5ad48d712
SHA2566068c6e24f7254a13fe248a39e0413d81318f1eb289612fc6680ae70c7f02723
SHA51299455891bd59234087ee6ac2ac1186e50a3ea7a25a24a27747db09c8ffb0e9bab7a0414049b3aa5e0eb9d7e5c4f88fc3bd0ddc3e69268af7173a18ee2e8bd694
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e1f7d7c2317d3a7245deda85c2834fd9
SHA14a87d2ed54d2d011a5fcc4ec3237851806eb0e9c
SHA25653135f33c99a988c8d371c2ce0610feb0cfb598542771ce1261cf104e75d8009
SHA5127113435e3407b4e05594130dcc37754ebf028a904a85e3d5958e11e31211efae15287218b13c43f621f7811ff7209d5913e808aedd1d4dc8926f006655ce3ac4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d08dcd33d9586fd2fd701b832bde34d5
SHA118f56c226bf65f0fb270c927b1868277a54f2692
SHA2563a882e3daa099f7ea87655717d325e6e01a9269eee79f0a7ae3a12fc359f3d64
SHA5123c8071a88dd1b503fb211f98efbcea75b6bee2f859b057a415db1e23774175b13839d34cce213e560cd60a6960e49eb6855b4e70169152d519ed6a939ae1bdc7
-
Filesize
2KB
MD53c90f28f8511a5221fe34d2b4e031063
SHA1f1e6d495ec890c83fc598c48da8f842971d1db0e
SHA2566005467fce7fd8985a7a6f70da700e9da6020b1b7f2d559b84e62db7dc637f3b
SHA512cafa81f8ce1668e6a0a90a0a2513505db777e528925f1b3ed99db932fdaaefffd41a1c23a454d351b31f52c4d5e44995a01184646970b56f638afa61cb1afe98
-
Filesize
7KB
MD5fe6a707c8eaabadbe8cbb3b1b5d14726
SHA1d5e6e62c0efb4b906aa6957db7fe9916418886b0
SHA2569e7dcc913be6ed5256a68eb90adc2dde1113585d1e4560e6a648e5e72c2cf0ab
SHA512a867de3beff2e13f86a82b416e6d133a89c1278d7edf3df54e3ec47d5eb28d136ad964d34543a2c75176f64dfd2ae0f9cb2f3733a771f0bd52aba94a4b7f551f
-
Filesize
5KB
MD52667a0c63e9a93b3c98ece06125423f6
SHA1364bcb25937abf624b71435fd3bd6508cd2e8dd5
SHA25608695c9f5aa27bfcc9835396f039e74137018ae8268d5eae2dfa1b926d6fd81a
SHA5122b59f9bd29800e469ff57fa0ea8b05f638bb1acc94f17f5dd524a09369c72d8653613762443dfd1ff8b8869f4f7491f0ca118a97ec7b912274e544035d656514
-
Filesize
6KB
MD5c833171012a3f47debcdffa526d2c14e
SHA112495ec67456191d8872711a7dbc293b2324e251
SHA256bd95b67fed99d3e0223d9f3f27dfffbf529060ba9253a00b5cbf4054c6717528
SHA5122558f300be908b51152cb679274e03c6b48b9ecdf23c2bb3546af25048f61be8e12ebddaf89a93c83fed45e8c22f5a312c3a614372f856a1c440cb583496655b
-
Filesize
370B
MD5d233322496704237f0551a604a92d052
SHA1d12340b39bdafca8b79c24d305d601d318173dc9
SHA256ed844007a066f665aecd13c90191be96c0630822165e46a2f3a912099c4b3018
SHA5122b6a9f9ba919530960bfb2b43d27f829e9bd52a3bede478adc851b5fc15fee5f48105e92a58e09e23b6240101e439e8b5b563e42abfa374963187fbdf237b377
-
Filesize
370B
MD5f92fe8425e12b93d3f531b411ffb36fd
SHA12e14dac4e531f36122325456b1073a7acfa80c9d
SHA25681f5fe1759f3e8204bdfc9516326f8ed4952a88eab0f9d9dc40bc22ce41eafa4
SHA51239675081a5d3c513315d35686715703c5dd1112fd77ab8c6b6e88892bed248afec661c32bbc92c58cff12afea2e6a3517250410e391d865a2bc907a8a60ff04d
-
Filesize
203B
MD54ff8cdc04f660af09ae9a70342751d50
SHA1c2fe271ad29bb73b43bc9fa2021f08b40ae43cfe
SHA2568f99a29923e9e5beee87af039ef5cfca26583df3b4b6eb769f46c1212e27d790
SHA5124230322611638b8bfbb1b0acfbd35d3e8da0b408b43b999fd283ba3d8fd33057a891bcc98758fce361051eab45d17fd73e6c33ffa27627f615dce13472418c9c
-
Filesize
10KB
MD53369545bfab2ba7dc02cef712d29a103
SHA18e639e176ee95402cbf5380c1f92d029d63cac4d
SHA256055d681cfa0684aefe75554290a88e7f345b25f644cea55bd144a3c568d2535e
SHA5121799ebbd3a978c207302b68977281eb2946263bcbb9a5dbaa9802220265a75f01f1ba4849aabf95dd7878b1bd3051d33d07a5ece2e6732e39a2e36ae6c928eb4