Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
9e96476e629469d850b3bef9fce8d381_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e96476e629469d850b3bef9fce8d381_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9e96476e629469d850b3bef9fce8d381_JaffaCakes118.html
-
Size
227KB
-
MD5
9e96476e629469d850b3bef9fce8d381
-
SHA1
57e9180b316ec1eb94742caa2a1aafd4e461a24d
-
SHA256
c174658b6887b9f17bb16b43e3b8090c23faf9c2b4325a630fcffbc3fe60794d
-
SHA512
35ac812c31ee8c430eb096b1c583a1fc9ceae6051837491e62ec93df842888355f20b8cf0fe9217e7722e72915d23e6c56292f9d93c244699bdbc4148833c42b
-
SSDEEP
1536:yuztRWw2ybfpaDY1yYOhyLSa3pha7auuYqE2fJ6O1T0Jme5ZQ5yaeELuKdBQm:yuzrxZQk1yiy2uuYqE2fJ6MikPuKbn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 1608 msedge.exe 1608 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4164 1608 msedge.exe 83 PID 1608 wrote to memory of 4164 1608 msedge.exe 83 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 4916 1608 msedge.exe 84 PID 1608 wrote to memory of 2380 1608 msedge.exe 85 PID 1608 wrote to memory of 2380 1608 msedge.exe 85 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86 PID 1608 wrote to memory of 4952 1608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9e96476e629469d850b3bef9fce8d381_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcad9f46f8,0x7ffcad9f4708,0x7ffcad9f47182⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,9527539753682651138,12343442806020616276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
20KB
MD54b3121a05808b99aa6e0cc12924f77db
SHA1ee5805bb76c384d1e1667aea2976bd2f4f94c7cc
SHA256e4fea32bac89d9ad34b13a25b0b4da1321920b2c6be2cabb75ff91bf6109152c
SHA5129b83d55691b41d2a45a542d163c1b6a47208969720ec1fd15233f29ddcef2243e79895cfcb008767f91b3d1cf3a6288248e8b1ec50027eb96db04cde56cb2605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5d914b11d963c0c0588a2be2bd487938d
SHA14f591d1bcf5b2eb8c35f7edc597473c33aae3707
SHA2566767c0ae12553d99f675797507862e99213bde7f0da21891278575051ec687c6
SHA512a8fe288ee3125b8a97ad3c8b4f3fd36e800b1fd55d2e79b3d1293e8d32de5377a6a97a94a3a7009019444d9dd5ea95b35572d440ad2156fe9215725468c44302
-
Filesize
2KB
MD520b126ffc7a9367158064d77d31ba421
SHA16fe6df12d57a1507cdbd5dae9be99c3b99b613b2
SHA256e6f890c9097a1bfa808481a311d9fc5ffdef6d5a5f7a0f0d5d9a80d0491f746e
SHA512615e33ee23dd4510ff8cd3daaffea06d27cce93755a4c2c84fb3f56136ff9684f22c551357d2d9b830766406474aee670df954a409601aca4030100214a3addd
-
Filesize
5KB
MD5592e59b3fb4fe145df29dbcd66116536
SHA15d6ed8228604893c5e8d4edc32806aed2a956680
SHA2560ee54593541f13530b6f5333c5c1d6d7c9d5c78aeba49921b8ac6b2e98353866
SHA51277ff2b514ee9c63f72ab6ddbc766af70bcaef51cd7d12ddf48174f88ff532188272d94946a43cd256d8aefdcd188cbb3c26553aa7d741e97123d0ddccdf28df0
-
Filesize
7KB
MD5263ee8b2193be320da964bdc57f4f236
SHA1e52e87a1d766c0c96cf6e3d3208886c0194de6a5
SHA2569437bbea1ab41bb0ba75b49efc4fa3bb999a89e8083e8290bb360fbdf4b0fbe5
SHA5121f9c84feee457fc69a62440793e519f65f95b1be833cb02001492840e3dd1f39b66115819a40dadf9f5a47f718b0193f0489fd39cba45f6bcedcd6df8eba3102
-
Filesize
10KB
MD5d0a3c798a387eb8a532435aeda466f6a
SHA1deec0d3825bb2dea7c80dbd17ab80d33c4f999e8
SHA25658dfe4b4bd050966f8defeab9a53975546e26f4deb64cde1229f218d85a661c5
SHA51264fb9998b67c925d2951565553e6acc7039e2cdc672b1516ce44c343eb8c695e0d931a470b1f3916e83f3d097b77fbd2aba5b882bebd2ab62a24d2bb697491c0