Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
960207648c8acba12a9711c8d29f81ce_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
960207648c8acba12a9711c8d29f81ce_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
960207648c8acba12a9711c8d29f81ce_JaffaCakes118.html
-
Size
77KB
-
MD5
960207648c8acba12a9711c8d29f81ce
-
SHA1
d20bbb1f9ee42a3051c1dfdf756bb7c9631ede34
-
SHA256
d4e05f8eb5874d9f17c28c2ff8b6206330865983c2fd28ebc898fbbbfeeb5c90
-
SHA512
d4140961cf1acb3bff870c671bdd0b205ab89eaa684855ba50d55c60115d2583aec9fe3c81ec6f69d43ca888f0d9466875f78d0feeccfe7b663d4fb10df89594
-
SSDEEP
1536:lVOyfMwPvT+dmdHqgx3mRPG0dZxuRtCVbxrM1LoTeclNlN:lIykK7+dmdHqgxWc0dMCVbxrM1LoCclJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 1036 msedge.exe 1036 msedge.exe 1132 identity_helper.exe 1132 identity_helper.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2608 1036 msedge.exe 84 PID 1036 wrote to memory of 2608 1036 msedge.exe 84 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 1580 1036 msedge.exe 85 PID 1036 wrote to memory of 3012 1036 msedge.exe 86 PID 1036 wrote to memory of 3012 1036 msedge.exe 86 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87 PID 1036 wrote to memory of 4464 1036 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\960207648c8acba12a9711c8d29f81ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9189546f8,0x7ff918954708,0x7ff9189547182⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,10046657880610753809,9559607657440722762,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5c58e60653437c51ad7c9675e7abd822e
SHA13e1b233d8d2e8a7f65e1a70092b69b19925b8410
SHA2566b0350a3adc961b82593e1da8e33d2234d52ff0b53d575e284a1d33cd16071bf
SHA51279ac7e286ca58acbfc5c7f2b0a59464485fa5af898b17611a29c8b8b8a0b2c694570a888611efc6754413c1d8b56ba340c8f41ad2561237e6a40034319308622
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD542affff4febabde981ebb803bb7a1bad
SHA10427d137a395e9e707c2d17330ecc9550b340c3b
SHA256f31fcdc1ec1656ec01d6cb211c22a221a4eaf213c14c1c179b855369abc97568
SHA512ad7fef73a0dbb4abbd5dd24c9cf7ea57c4822c6c46592c80e07ea19d3b272d445fa7a4301e1fb37b6baad8a4f3dc6eed57ca251c0c9e3290cc09cbeb15b4e1af
-
Filesize
2KB
MD5bea65bdde1a86cdffe90cd8507455205
SHA169f83219fcba4085478325af0836c83e4f406f71
SHA25676b8688e432d2d83bd9a9cccea49df7c6d6159c5d9b2997f738888852d190530
SHA512c3b0ca7ef25f9280e29feea67519dd449616731c3e704874ca4c089ff7a56c0812832093d81b5374551e3f8e3567e34e663749c5b35225dd3238791c1e72141d
-
Filesize
1KB
MD5980a37758d34ad00cb93915ba0857426
SHA1a5cf11c0e73a14a058a8102a1aa3f40db3eefd4a
SHA2561f30cfcd7a162233a82f54d6f93f048a128da98f78c6807fe7b617cd8cffc27b
SHA512bf432a0e437c49777e74e69205d9bb045903d44f0373bac92f241205c40e2f64d48832ae4de2a41e3cb33323da8375fd4f2f2780a8b7ad71dd58449dd0ab1726
-
Filesize
7KB
MD5bea9e4022cd807a4ae749abdd4dba403
SHA1544f9b31c5f33a22e8228a4f6a53fe2d1085f752
SHA256fe3996b8d3251ded225cefc4610ad1fb3eb80b7e59624be594031e455ee2ce45
SHA512bc657445a8c2afd20b7651ba123479cf1aca754e0b1f8be52f315d4e77831d0d849e771f4ef6496444dc541697209b2cad917eeff49092f4b3838fc9aafdb6e0
-
Filesize
5KB
MD54a173e40fef5421d13dec758ab286bb3
SHA13f81961e54eaa12b818bd5d6846bdf14e9f40501
SHA256d438d01dcbf5ffbe6af505eb1d361addc2b97c5b07d2d7bd2ceb0ae4267768c1
SHA512e504099a2a7266bc497b5222cd26dd7007134b27da9622f0c1e339a139acd7625de07bb5cf6f2b78fb07efe90cf2f2a0bf3e08c88ebad3f0192b25dcaa44472a
-
Filesize
6KB
MD5231a558af148b2ce13f7cf2a230bb0a7
SHA16f1057bb8a680cace1ab288a0c3c590312476f69
SHA2564e7dd88143bd0c109b7d2bb0f0f8b2041e358a3bf0f5d347ecb89f664addf761
SHA512f0795fc3691d7590988d4216e96df039437917b049087b06f69c8c27ecd1475b9ab9eb23dfd070e02cfd5fd1323d1c0f8910befc4a84e0a456384bdd1d02bae4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389