Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
b4b38667a3895947e8b201589a491ef2_JaffaCakes118.html
Resource
win7-20240729-en
General
-
Target
b4b38667a3895947e8b201589a491ef2_JaffaCakes118.html
-
Size
216KB
-
MD5
b4b38667a3895947e8b201589a491ef2
-
SHA1
c46fe1a3b9b21b7fc3a9d2ab0292dfdb4847f4f1
-
SHA256
26236770362829bf1111d821b8bcdb02c813547e147a915c858e89eb6a7efd13
-
SHA512
6601abcbe17b03072aa4acbb5ce5fe2314c692b2a1070e164068144c5f6998a92b68de5faba160fab9b07c72c5b406ebcf49762396bfc4eabfa98c89bf16bcab
-
SSDEEP
1536:d69QfOBsRhm3YcUGYyCe95NwiqBMneeYRmR/nEtA3pqQLX++ImgD3CHfmLdBTPQY:d69C6WcYciUj/MOlexxNTv3JjvLJf
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 2256 msedge.exe 2256 msedge.exe 1224 identity_helper.exe 1224 identity_helper.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1932 2256 msedge.exe 83 PID 2256 wrote to memory of 1932 2256 msedge.exe 83 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 4876 2256 msedge.exe 84 PID 2256 wrote to memory of 3712 2256 msedge.exe 85 PID 2256 wrote to memory of 3712 2256 msedge.exe 85 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86 PID 2256 wrote to memory of 692 2256 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4b38667a3895947e8b201589a491ef2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bd7e46f8,0x7ff8bd7e4708,0x7ff8bd7e47182⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2044 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,2525166037794105356,8606943264906680527,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
41KB
MD59631c594f55c395f07b12046cb8fbf9d
SHA1cd6532d1689166c19477923c73083eaaf8cd21e3
SHA256a56a5d0f5f612bd39fb02fa1ff7a721a33fcb841f40c48757381b3b7c4a25726
SHA5125d3bada46dbc583755c279b5ff3c155e15f16d51b6522752ab289bdb62b71abe1d91def5733ef7e77fc01d127508d07e2c67e731bde26a478c4780c8918ba105
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD558f0155d61ef2fb90b75080e3f3a9a74
SHA103e30bb03a7d690ed0a794f703810b82d0676339
SHA256426d67fbe530a72c033626346dd8f02e375f8ba582ee66f2853b01392fd3c6ca
SHA5123383a377272b235e2a74dad13507a1d202917170b4e5eb5fa9ae9fed4b07c50677a818c038dace4f0f396f7767f5d1578da9ddcc6943dae5f857bb7b8486e77b
-
Filesize
1KB
MD58176106393a3a0bc9d8cc7c8f61a39f6
SHA1f3c525284f4ac5b7a5a41f70ccb7346295fd2abb
SHA256916c623eb527c870a24ffaaa263371c588b941d3ac19fe00017d9648bf78dd79
SHA512cdf63abf98e6530d6a40b3059a239303acd08c2cc3ea21b523d4c087554f9f5a1d96216a58d9a008f0beed0db5536202b910036aa3ac44f9ef0981a9d2f1d035
-
Filesize
7KB
MD5809b2f7aa6f7ac569947143c4e37e15b
SHA125a658601693bbc467080b2d866e77dbba866a11
SHA256fca7ad8e10144bf1b4fb6fa5ff35bf877b506f18ef5e52e95bfab23768a9eaa4
SHA512d290279a80919b20d8851396d8942e4bb33896fc4621f98420105eeddc468029e3909d25d34cc35bd8ba396ed079c5b35f1e102390f5626b22322a8cb2708624
-
Filesize
5KB
MD5db80f1ce7eb1ae7683159f934f65c7e1
SHA18a17ff3a19d90f5965e0c9f3e823919b419cb4cd
SHA256d05d6bec3f2166819f6a6036d3adb7b882d9737747acb579745d0a103e88d1c9
SHA5128b011cba7baa7c73da785e99188ba21096933ae7972526393796964d7d027e90f148eb20a4e0a9898bb5e0119cb23cca1af192803ec61f44f015a086bc4cf64c
-
Filesize
6KB
MD5addafa8dd28b7bf003334ded42d3680c
SHA1ad1c411f4c597c470d9205f3ff8c8db93cc2a08b
SHA2561fe79d7b17a8ab28326dcd7cc620d2d16f68a447a0b7b139b54c1db8f6cf05f7
SHA512c99218fa5c13e3edf924706bc9a64baf90106df6b8a4d5fb860a08ff62e5078331b077b98090668b4b29e1e36edcf9f92c0ed3b45191efd3a31883cf3988ceda
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d8160c9fc033369955ea5d415abeab8c
SHA14ddf0ef3527d356becb5f7d3777d5e03776510c0
SHA256890e16244bae7f96310925bb9c9f549a539dff9d3f4850fe282a7b665c611395
SHA512b2276dda26bb1da7788f6d1fda4e834d061851349bd0a3850644381d3a2dc932858f9e79768c8fb7ce325089b4dcd500d1a1cee7befd0beff1f2a0e4a7be66be