Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 10:27
Behavioral task
behavioral1
Sample
94139c4a26a64f860852789af727aff0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94139c4a26a64f860852789af727aff0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
94139c4a26a64f860852789af727aff0_JaffaCakes118.html
-
Size
47KB
-
MD5
94139c4a26a64f860852789af727aff0
-
SHA1
34ee6cad4c2e232a060cf1983373d993086f76ea
-
SHA256
750b6263f30b796c6b276982f3fa25c2bc0f4ab29abba3b18f3aac3656093b00
-
SHA512
e3699226d2233a3dd66f8f0f794b11573743f7dc9d24ac81929f2cb75f833c01eb78721e93b036b3b83cf5ba8d633d9c905ec870928fe54efbebebe88250ab7a
-
SSDEEP
768:DJi4S5y56DLhIGJYjQ75l8lF+nbo5SLmtMmR29byhT:EX80DLh/AsbEPtMm/T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 3716 msedge.exe 3716 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3716 wrote to memory of 4504 3716 msedge.exe 82 PID 3716 wrote to memory of 4504 3716 msedge.exe 82 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 5024 3716 msedge.exe 83 PID 3716 wrote to memory of 1660 3716 msedge.exe 84 PID 3716 wrote to memory of 1660 3716 msedge.exe 84 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85 PID 3716 wrote to memory of 3968 3716 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\94139c4a26a64f860852789af727aff0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff06ba46f8,0x7fff06ba4708,0x7fff06ba47182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9504861213106278459,16250333282567132830,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,9504861213106278459,16250333282567132830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,9504861213106278459,16250333282567132830,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9504861213106278459,16250333282567132830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9504861213106278459,16250333282567132830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9504861213106278459,16250333282567132830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9504861213106278459,16250333282567132830,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
41KB
MD59631c594f55c395f07b12046cb8fbf9d
SHA1cd6532d1689166c19477923c73083eaaf8cd21e3
SHA256a56a5d0f5f612bd39fb02fa1ff7a721a33fcb841f40c48757381b3b7c4a25726
SHA5125d3bada46dbc583755c279b5ff3c155e15f16d51b6522752ab289bdb62b71abe1d91def5733ef7e77fc01d127508d07e2c67e731bde26a478c4780c8918ba105
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5faa477408840c809d5f28cd7f8e1fce4
SHA128f0a09beee94af00b93b30d7412fa2501eb1476
SHA256f3bfbc2ae0273b26afa144403652ae14c5fae831d2888db28fc79c403e342ea3
SHA5124c4d07c89aac3a659b1e28cd548811cd7ccbfc4b6fac323eab6511f79eda76ea348025b51660914711630bc83bf96e83a70078dde842d5408b0ed95dec78d843
-
Filesize
1KB
MD5e70acd83cb84f7b73d18acd16102a824
SHA14c77b95933e13a1386d3ff512446119b3b8a5885
SHA256dd5a450d0ad2afd732ce54c71f6ba4698993e7e96357e6dc13d59b7882b85868
SHA512becc30cf3756d575ab8de901b19ff30e3c9331e305cc964da3a323a180f07d1317fbf35348c788346a17cfc353fda83fdfad32988c673c85a0835c26a68d08d5
-
Filesize
5KB
MD5a42310758f82c96bcf4923790705fe91
SHA1ce285468881fa6e25b58f44aab7377f0969de891
SHA25645715beb8c32970b1ce5c7f2a94634cd3f96570543c2d932da62c773da3f86d1
SHA51261614ab6eb04cf4bc25374c06173869e0c6ea09d3ba4ae4e4e5476bc94447760c18740eae85cad9e96b937b74400fe1620d78badd997cebc7af53d4b502d84a2
-
Filesize
6KB
MD5ef98f590228a59c34af9276896f7ee10
SHA18fcec48eee3906ea98c68302af0810e3da7f7e7d
SHA2567597b733798baa3f50596947e2b3b678f70fc68e8bec8d6abe6ebde8c5be2cd1
SHA512421854fb39a27ee6ca8a9256f33565c2462685c53597d07ebcc2328449bdca1cd2f5c243cf2b031fff80e0a46bd2406bc59367c06a5ef8e1b0b449a24dee1770
-
Filesize
10KB
MD5187e13202087b1704fda2a901c198508
SHA10ae767eb1666abb369474ea9d0135713b3eaea57
SHA2565e75671d22ba41383787d16ae1d296931aad76603a74a11afb4020563396bf1f
SHA51232f4958c5587f870c22041ff5190763830f971b5c68ba7d76ccaaee80950d2b3114212ac0f394f4e8f6479a13d599dc78d4a8845884b5a5c08cd3a0d70c93f02