Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
9fb91a102b1c6f4715c220879c243bd6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9fb91a102b1c6f4715c220879c243bd6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9fb91a102b1c6f4715c220879c243bd6_JaffaCakes118.html
-
Size
198KB
-
MD5
9fb91a102b1c6f4715c220879c243bd6
-
SHA1
14ad28f0fd2c37258a21abce065f27ec12ac92e8
-
SHA256
3ae1df2253adf848ff36bbc3232c243a1b8d48e89d6d4be8de9d8a71e810a3d1
-
SHA512
812453efc565b14edb900dd9c30b228c2ec2ef381e15e12028212f2acfce9c0f1219f4587f33cc7a75b49f69107741a0550b1e0ef9d0671fdaecc26a24fe9850
-
SSDEEP
6144:/6ZQpRP8ciSIIrBSDS7/HMLIRknoa5yNWd3kFoAcJiU0DMZOJa0XUgqz8NDnu2/r:uQpRP8ciSIIrBSDS7/HMLIRknoa5yNWA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 3400 msedge.exe 3400 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4708 3400 msedge.exe 82 PID 3400 wrote to memory of 4708 3400 msedge.exe 82 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 856 3400 msedge.exe 83 PID 3400 wrote to memory of 1696 3400 msedge.exe 84 PID 3400 wrote to memory of 1696 3400 msedge.exe 84 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85 PID 3400 wrote to memory of 1140 3400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9fb91a102b1c6f4715c220879c243bd6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffdfeac46f8,0x7ffdfeac4708,0x7ffdfeac47182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15857969670732208216,6742735596121186084,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
41KB
MD59631c594f55c395f07b12046cb8fbf9d
SHA1cd6532d1689166c19477923c73083eaaf8cd21e3
SHA256a56a5d0f5f612bd39fb02fa1ff7a721a33fcb841f40c48757381b3b7c4a25726
SHA5125d3bada46dbc583755c279b5ff3c155e15f16d51b6522752ab289bdb62b71abe1d91def5733ef7e77fc01d127508d07e2c67e731bde26a478c4780c8918ba105
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5adbe03a970141cd424ffad089065fc54
SHA14bd36f8b5dc6a6fade02d710076eb1e8f83be24b
SHA256f90465758655408059f361d1c9767ac8ebbd1acc8f662cbbae2502bbf8dca72a
SHA512d7f25444cc506a6592092eea563235740c6659c8b7ebe3efd37e2eaf8f047bd9b8a191882169ec2128052b54ac4149d20a578dd566b68d1d92f458664b35d9ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD52d978415a5ffbbc28f33b2694d8faf55
SHA1995414b614e0b10131126ef420850b0a8d7b8c57
SHA2568788b8637631d5e541184f77a375191d78019b4be34bc62aa251a204d54f1ad6
SHA512f7cb57f6299d660b0be3c7b9100fdb38e57f820e1ddb7165c0995f522ced67f71e4bc089cf270977fb4c049b69b638e85452022b877ae6c219e75b2479cb287d
-
Filesize
3KB
MD5f44778dd48a9514120918650b0b4be73
SHA1c40c3edd0460c17df9762c7497364dfcadcff390
SHA2561dd84a3b1531e2e514b26a03abf2a2fad26e20151ff6473e67586c2dde55ade3
SHA5125e19a92aa79ff7d9858d98b20780d1a35ea23d53805120e360ab7bbe48eeacf8035e0c8b63798f5b7977fb4a5aac0de5395cefde408c8c77bc695c185435ce42
-
Filesize
5KB
MD5255f07c2a60061bc6c5232a48da1b636
SHA18fec9565d8cca8fcac9c40891e35af2345621b93
SHA2560bee3b68341f59876d5a58dcfbb3726ea4d5e1d642e2eae5463500b8d167c321
SHA5129a46a816bc85c01c4885f4f797618d6a7e9f0cc6e5daa3b5b3cf7f0b0ba05cd1e033e109771ded99e2f80a99085a965bf3a993fb49506deab8523b997e0f0fa5
-
Filesize
6KB
MD548906fecd9d0fc9c72b85cececbedcb5
SHA1f4a400f9c04edc2c4751a808d2ac3429704a9baa
SHA256d0d904839f93b911c775be495a3017693345b4efb17a5891899616bfa43e7804
SHA51210cf5ffd520eb04746b25c3b0651638fd167462d547e486f34dfd73d133dd9330e4a1a73e9c64102b04c717dcb7830d10c83e2089216702a365922f912b5d367
-
Filesize
10KB
MD513fe8a9e84f9bd97d1651cc785a1e0f7
SHA1b701cfa0f999b01bbe6966a8eb7a52b580f03224
SHA256166ecf8433ca198c532e34d143a9c6689aad297ded30c60a60a2621565205406
SHA5123e19d4c6b85b1f59f248693eec74ea1ab5542fbb2e39b85501a34153c2b8e6502445802e6513829a21249593acf2af7490b028964bb8e6f255e7f5b56ba2297a