Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
8dd002a43a9e013951f7792dc8bff97e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8dd002a43a9e013951f7792dc8bff97e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8dd002a43a9e013951f7792dc8bff97e_JaffaCakes118.html
-
Size
228KB
-
MD5
8dd002a43a9e013951f7792dc8bff97e
-
SHA1
e35841ed7117efdcdd9e9ffabea72f3e44bdd62c
-
SHA256
da52d4cd04d07cac06dd684d4440e88407b842313ce337f4f33269bb4c3a94d6
-
SHA512
5437d5a9add7dbc0f661bddfd8cbbb52923c9e4b8d9302817681f5c3b86d125763089f62377f83ed403b82af25efa7d23d9583dee73a4ba75ff208aa53f33179
-
SSDEEP
6144:e+RELVzhXkA3d8VZQvzwV2lms5JBpknvjXGXgcHM1HMKQT:xRELVzhXkAN8VZQLfh5JBpknvjXGXgch
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 4996 msedge.exe 4996 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2168 4996 msedge.exe 84 PID 4996 wrote to memory of 2168 4996 msedge.exe 84 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 4384 4996 msedge.exe 85 PID 4996 wrote to memory of 2512 4996 msedge.exe 86 PID 4996 wrote to memory of 2512 4996 msedge.exe 86 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87 PID 4996 wrote to memory of 876 4996 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\8dd002a43a9e013951f7792dc8bff97e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff807a246f8,0x7ff807a24708,0x7ff807a247182⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2468 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1362617642440165092,5928684588517018862,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
42KB
MD5101f2295c59a6c129b95bb68093aed06
SHA112f5843daaf99bdb874dfebaf10660c54ede2120
SHA2569b59525954d9da17ff56cac0c0cda55bb6c4df6b7550fe68565fe0d24a963ac7
SHA512f5e54b7609a1884253f1d05d9245def95b3721e1163ddabb6d32f5b31f824a218c60533eef25a6f91d8ae6fa314128ae258fdc341cf9a4f36bf378e874b5277f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d0580174b32a7b1db625615409a1e313
SHA14640c22b98fbbe009d0f8ef494c3e36ed9abbace
SHA256caaeb49a2e7c24dec06931db02b5c8ec49670f238652386e6d3913fca1ad0a48
SHA512506f40d42bca01b40ec0b10439b6c3979183774157cb69ea90c98497c5597cd19f674483a64a50bc4f4b723688bfeaa66c6307e586983ce3d6f927e49e327915
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5ffe880de8b4f4d1d97ff642d9b4f6bea
SHA1dfa94c62a2966a2a809984517fe927b90ccedc4d
SHA2563e68199d1aeb68fae69d1e44b94ab52b26732567d817f251ea46aaf0ccb0969f
SHA512417bea1ef9c5665030bd88507b427018daf8428d65bcb961be5c15988811ae8f5296556c9363e0817fbcc3276b9d2f37863d09173949581a9fc7a224da945cb5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD58da309e272097873f96b8c7e87a0d983
SHA12bb282db34069b87e2df6b4935f9b326e75ae6e9
SHA256ac0531c37147883daf83c645844f81796ab19c12a4de22e9734bf246d0a1c858
SHA512f9109e71a6a1e2525db6d37e82b81637d23b6f203c540b0bd82c2b9104fea839aa49da30c38bdb0d1022817af280c8d0960d8bdf9dd43e49e9e849491b4bd7eb
-
Filesize
1KB
MD5373ea385f9f8b557bc144425c530a1d5
SHA19050da9dec2c4f77c63041de1e5bf310e836f9fd
SHA256925d01df3d46df36b6d8a3147a4eb563ee406d11577e8bb1b5293d7d5197a810
SHA51234763dfb229eaace9f9682f522445ba54e2c63cda35495335b31414b5348c10cbbb143f74c7d99f61427608811a757c93ced72fdc225dc1b5d4e85fc95d57234
-
Filesize
1KB
MD5050e1abb6905b90fc72cfe5b2e1ad88c
SHA1e83eba26e5ed38ae7c5430a1fffdd16f0ae9d3c7
SHA256cb42213dfa651ca4bce540b2a28e88655c6584655d6df99821beaf0468ba3f9d
SHA5127de60ba413d9df0fbf38f8c98902346b9aef2c1f01b76417c61271b3fafba68513c243871df09c85a29f0a547d2b89155db2344dbb04bb631f1850f3ba2b6cf2
-
Filesize
6KB
MD5ebc378f7888eba40fff2524e95df83cb
SHA1117a9827aa35b01c63135856b4ceb6bea5697d7e
SHA25685139fe2455e03b67911d4618287b71547aefc70480299b28e75ad390dac015b
SHA5128568bd24d55dee5d98a3e951d8892872de85dffa66c5000f05fd886eea86249c5985ece21790aa75ff14a49269fb2553468d8b4a6391a88bd2c4a331348a6f6a
-
Filesize
7KB
MD553bef3dfe9368e40beaefd26ba285a14
SHA1bbfbd87e564a87b3273641680fccc3d6c57fcbae
SHA256688ace913c68e73b53d1610a6ec0481476efe3cbad906a0058435ddfaa6b5c3c
SHA5125fdceae9ddf35f968e0b11737891c075d3a5c7e8b54435069dd4c9e2f7eae6d3f1350405c0e318d0caf15ea8c475265e30b112ec2a6e9bb7a48aca53b7a2e415
-
Filesize
5KB
MD53ff3033c377a668c123b4054d1509e42
SHA13f8d03ec90fe627a07fcc4685bf9c2fd072601fe
SHA256f9ea13fc53833e43e60d4c2885e03ccabe3edb52013136dcc4fd7501bf540276
SHA512eba012c69004b5f86d6f9291778359d48f5f15a58521fa50e2d8e9748fb974636bade274eb5ad15d6625d87dcbc21e938ea51890d5ae177124ac9d91f48bb99b
-
Filesize
203B
MD5fa5149aca667d05406a4f65e161f8fd1
SHA1cd5ed13d028beeaae3ce9500093152f327401b80
SHA25631c2025994cbe243e84e21b7cb6a4b94a14f5c09190f4cedea940173b671bf4f
SHA512402da0301357bba1b884b8296cedd76c024c8feb0a08a2e246ea976b270bd06d40a49f06f57a0ec727c4795dddf859d70c2148a40463a2671d5c43de31f549fd
-
Filesize
203B
MD5fa9f20ed5ef590ca8088cb345041677a
SHA1794ded61f5bd405c4474b1bdb538a14ca6981239
SHA256e2d2be97bfe8e43026e2d3da6988ed38c0ca10950c3edf47391fbc61cc5a4d6d
SHA512ff997309b9144e9074cdc6ddf363280c4753222f01dcbe85b0dc6ddd1350f857c04b642b64ba77e81f83db35c8fdc34c434cd61742a6a69443e05aae7df30cc2
-
Filesize
10KB
MD5d04758119a4e6d1e38c9be28328c37d9
SHA1304622c89521813b285fc116aa1201dd00c1335f
SHA2561e999e24e5c25724b611496353389751e63831d2247de90650f946434adbf24f
SHA5129173af15e271fe438e99053e7700e1d68890fa04abbda9e5251700c700fd3ccb9755d1e8d1a18d3b704dcbdbed47fd89eef01252ce1f4e278064f5695c7252f7